Required Skills

SOC SIEM Vulnerability Palo Alto Endpoint Security Network Security IAM and GRC Cybersecurity assessments Database Encryption

Work Authorization

  • US Citizen

  • Green Card

  • EAD (OPT/CPT/GC/H4)

  • H1B Work Permit

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • W2-Contract

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 8th Oct 2025

JOB DETAIL

· Candidates must have prior experience designing and integrating diverse information technologies, managing complex system interfaces, and developing secure architectures.

· The successful candidate will work closely with program and account teams and customers to identify and shape near-term and long-term roadmaps, architectures, and requirements.

· This position will be responsible to lead a high-performing team of Cyber Security Architects and play a significant role in HCL’s efforts to expand its portfolio across the Cyber services market.

· Enterprise Security Architecture: Assessment - to determine the strength of the foundations for security within organizations and to ensure that their vision, strategies, processes, people and technologies are aligned and organized effectively to optimize Cyber Security in support of their business goals.

· Design & Implementation: To design and build security into organizations from ‘top to bottom’ so that it can be justified, and from ‘bottom to top’ so that it can be seen to be complete.

· Technical Security Architecture: Assessment – to determine the strength and appropriateness of technical designs in mitigating relevant Cyber threats. Design & Implementation – to formulate & communicate new architectures and demonstrate their suitability in mitigating relevant Cyber threats.

· Security Leadership & Management: Planning, managing and organizing the delivery of Security Architecture to clients. Assisting with the development of the Security Architecture Practice within the firm.

· Identify and evaluate complex business and technology risks, internal controls which mitigate risks, and related opportunities for internal control improvement         

· Responsible to install, integrate, and maintain one or more Identity & Access Management products such as Okta, Microsoft AD, and AWS AD in client environments  

 

· Communicate the IAM aspects of both the production support and maintenance at the technical and functional level to maintain or resolve a technical situation 

· Security Transformation (and Security in Transformation) : Working in large scale transformation programmes, building their capability to assess and design Cyber Security.

· Communication & Influencing: Working with senior stakeholders, utilizing Security Architecture methods and collateral to influence their decisions.

Company Information